Lines Matching defs:new

289 				     struct ieee80211_key *new)
291 struct ieee80211_local *local = new->local;
292 struct sta_info *sta = new->sta;
297 if (new->conf.flags & IEEE80211_KEY_FLAG_NO_AUTO_TX) {
305 * new Rx/Tx aggregation requests during rekey to
327 /* Stop Tx till we are on the new key */
431 struct ieee80211_key *new)
437 /* caller must provide at least one old/new */
438 if (WARN_ON(!new && !old))
441 if (new)
442 list_add_tail_rcu(&new->list, &sdata->key_list);
444 WARN_ON(new && old && new->conf.keyidx != old->conf.keyidx);
446 if (new && sta && pairwise) {
450 ieee80211_pairwise_rekey(old, new);
459 if (new)
460 ret = ieee80211_key_enable_hw_accel(new);
463 /* new must be provided in case old is not */
464 idx = new->conf.keyidx;
465 if (!new->local->wowlan)
466 ret = ieee80211_key_enable_hw_accel(new);
474 rcu_assign_pointer(sta->ptk[idx], new);
475 if (new &&
476 !(new->conf.flags & IEEE80211_KEY_FLAG_NO_AUTO_TX))
477 _ieee80211_set_tx_key(new, true);
479 rcu_assign_pointer(sta->gtk[idx], new);
485 if (new && !old)
501 if (defunikey && !new)
503 if (defmultikey && !new)
505 if (defmgmtkey && !new)
507 if (defbeaconkey && !new)
510 rcu_assign_pointer(sdata->keys[idx], new);
511 if (defunikey && new)
512 __ieee80211_set_default_key(sdata, new->conf.keyidx,
514 if (defmultikey && new)
515 __ieee80211_set_default_key(sdata, new->conf.keyidx,
517 if (defmgmtkey && new)
519 new->conf.keyidx);
520 if (defbeaconkey && new)
522 new->conf.keyidx);
767 struct ieee80211_key *new)
772 if (!old || new->conf.keylen != old->conf.keylen)
776 tk_new = new->conf.key;
784 new->conf.cipher == WLAN_CIPHER_SUITE_TKIP &&
785 new->conf.keylen == WLAN_KEY_LEN_TKIP &&
786 !(new->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE)) {
795 return !crypto_memneq(tk_old, tk_new, new->conf.keylen);
822 /* The rekey code assumes that the old and new key are using
842 * new version of the key to avoid nonce reuse or replay issues.
1114 * and then new keys are installed. The first new key causes the